CVE-2026-26956
Received Received - Intake
Full Sandbox Escape in vm2

Publication date: 2026-05-04

Last updated on: 2026-05-05

Assigner: GitHub, Inc.

Description
vm2 is an open source vm/sandbox for Node.js. In version 3.10.4, vm2 is vulnerable to full sandbox escape with arbitrary code execution. Attacker code inside VM.run() obtains host process object and runs host commands with zero host cooperation. This issue has been patched in version 3.10.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-04
Last Modified
2026-05-05
Generated
2026-05-06
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
vm2 vm2 to 3.10.5 (exc)
vm2 vm2 3.10.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-693 The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in vm2 version 3.10.4, an open source sandbox for Node.js. It allows an attacker to escape the sandbox completely and execute arbitrary code on the host system. Specifically, code running inside VM.run() can access the host process object and execute host commands without any cooperation from the host.

This issue was fixed in version 3.10.5.


How can this vulnerability impact me? :

This vulnerability can have severe impacts because it allows an attacker to break out of the sandbox and execute arbitrary commands on the host system. This can lead to full system compromise, data theft, data corruption, or disruption of services.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade vm2 to version 3.10.5 or later, where the full sandbox escape issue has been patched.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in vm2 allows an attacker to escape the sandbox and execute arbitrary code on the host system without cooperation from the host. This can lead to unauthorized access, data breaches, and potential manipulation or exfiltration of sensitive information.

Such unauthorized access and potential data compromise could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over data confidentiality, integrity, and access.

However, the provided information does not explicitly mention compliance impacts or regulatory considerations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart